Database incident table, Database Management System

The Incident table, with an auto-incrementing incident number, etc, looks like:

incident_num

reporter

date

time

incident_description

category

1

john1

2011-01-10

16:17:34

Can't remote login to AFS

network

2

bert456

2011-01-04

15:09:57

Password reset failed

system

4

john1

2010-12-29

15:10:59

DB Account requested

DB admin

Data sources:  The times and dates are internally generated by MySQL based on the data types used in the table. The remaining fields, with the exception of the Incident_num which is internally generated, are determined by the HTML form inputs.  Some form inputs are not inserted into the database but just used to guide processing [like the reporters indication as to whether they want an email copy of a submitted report,  or not].  Some inputs like the email address, and the reporter (name) and password are already in database tables, and are only accessed [retrieved] for purposes of controlling authentication or email authorization.  Some database columns, like the email limit for a reporter and their current number of sent emails, are entered manually using phpMyAdmin.  They may be accessed for decision-making [like the email limit for an address] and update by the program when an email is sent.

Posted Date: 3/29/2013 5:50:48 AM | Location : United States







Related Discussions:- Database incident table, Assignment Help, Ask Question on Database incident table, Get Answer, Expert's Help, Database incident table Discussions

Write discussion on Database incident table
Your posts are moderated
Related Questions
Safe Banking is a Canberra based credit union, which has several branches around Canberra and Queanbeyan. YOU have taken over Safe Banking. YOU need to create a database that organ

Describe domain constraints. Domain constraints contain entity integrity and referential integrity. The domain is a set of values that might be assigned to an attribute. The en

Column Constraints: NOT NULL, UNIQUE, CHECK, PRIMARY KEY, DEFAULT, REFERENCES, On  delete  Cascade :  Using  this  key  whenever  a  parent  row  is  removed  in  a referenced

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict

Explain the Management of Data Store Every system irrespective of its nature of application requires storing permanent data for consequent use in problem solving. Some objects



Explain Superkey Ans: A superkey is described in the relational model of database organization like a set of attributes of a relation variable for which it holds that in all re

Explain the ANSI SPARC architecture The three-schema architecture is as well known as ANSI SPARC architecture. The aim of the three-schema architecture is to separate the user

Hi, Do you offer private tuition for DBMS?